Network Interview Question
Network Interview Question
1. What is a network?
Answer: A LAN (Local Area Network) is confined to a small geographic area like a
building, while a WAN (Wide Area Network) covers a broader area, such as a city,
country, or even the world.
3. What is an IP address?
Answer: IPv4 is a 32-bit address scheme allowing for 4.3 billion unique addresses,
while IPv6 is a 128-bit address scheme allowing for 340 undecillion unique
addresses.
Answer: A subnet mask is used to divide an IP address into a network and host
portion, defining the size of the subnet.
7. What is a router?
8. What is a switch?
Answer: A switch is a networking device that connects devices within a LAN and
uses MAC addresses to forward data to the correct destination.
Answer: A hub broadcasts data to all devices in a network, while a switch sends data
only to the specific device for which it is intended.
10. What is the OSI model?
12. What is the function of the Transport layer in the OSI model?
Answer: The Transport layer ensures reliable data transfer between two devices,
providing error checking and flow control.
13. What is the function of the Network layer in the OSI model?
Answer: The Network layer is responsible for logical addressing, routing, and packet
forwarding.
14. What is the purpose of the Data Link layer in the OSI model?
Answer: The Data Link layer handles physical addressing and error
detection/correction, ensuring that data is transmitted correctly over the physical
medium.
Answer: A firewall is a network security device that monitors and filters incoming and
outgoing network traffic based on an organization’s security policies.
Answer: A gateway is a network device that acts as an entry and exit point for a
network, translating different protocols and enabling communication between
different networks.
Answer: Bandwidth is the maximum rate at which data can be transmitted over a
network connection in a given amount of time, typically measured in bits per second
(bps).
Answer: Latency is the time it takes for a data packet to travel from its source to its
destination across a network.
Answer: A packet is a small unit of data transmitted over a network, containing both
the data and control information (such as source and destination addresses).
28. What is a broadcast domain?
Answer: A collision domain is a network segment where data packets can collide with
each other when being sent on a shared medium, causing network performance
issues.
Answer: A VLAN (Virtual Local Area Network) is a logical group of devices within a
LAN that are configured to communicate as if they were on the same physical
network, regardless of their physical location.
Answer: The ping command is used to test the reachability of a device on a network
and measure the round-trip time for messages sent from the source to the
destination.
Answer: The traceroute command is used to determine the path that packets take to
reach a destination, showing each hop along the way and the time taken for each
hop.
Answer: SSID (Service Set Identifier) is the name of a wireless network, allowing
devices to distinguish between different networks in the same area.
37. What is the difference between a public IP address and a private IP address?
Answer: A public IP address is globally unique and can be accessed over the
internet, while a private IP address is used within a private network and is not
routable on the internet.
Answer: TTL (Time to Live) is a field in an IP packet that limits the packet's lifespan
by specifying the maximum number of hops it can take before being discarded.
40. What is the difference between static routing and dynamic routing?
Answer: RIP (Routing Information Protocol) is a dynamic routing protocol that uses
hop count as a routing metric to determine the best path to a destination network.
Answer: OSPF (Open Shortest Path First) is a dynamic routing protocol that uses a
link-state routing algorithm to calculate the shortest path to each network, based on
the cost of the route.
Answer: A DNS server translates domain names into IP addresses, allowing users to
access websites using human-readable names instead of numerical IP addresses.
46. What is HTTP?
Answer: SSL (Secure Sockets Layer) and TLS (Transport Layer Security) are
cryptographic protocols that provide secure communication over a network, ensuring
data privacy and integrity.
Answer: FTP (File Transfer Protocol) is a standard network protocol used to transfer
files between a client and a server over a network.
Intermediate Questions:
Answer: Symmetric encryption uses the same key for both encryption and
decryption, while asymmetric encryption uses a pair of keys (public and private) for
encryption and decryption.
Answer: A load balancer is a device or software that distributes network traffic across
multiple servers to ensure no single server becomes overwhelmed, improving
performance and reliability.
Answer: A DMZ (Demilitarized Zone) is a network segment that acts as a buffer zone
between an internal network and an external network, often used to host
public-facing services while protecting the internal network.
Answer: Stateful firewalls monitor the state of active connections and make decisions
based on the context of the traffic, while stateless firewalls filter traffic purely based
on predefined rules without considering the state of the connection.
Answer: A wired network uses physical cables (like Ethernet) to connect devices,
while a wireless network uses radio waves (like Wi-Fi) to connect devices without
physical cables.
Answer: A routing table is a data table stored in a router that lists the routes to
particular network destinations, including the next hop to take for each destination.
Answer: NAT overload, also known as PAT (Port Address Translation), allows
multiple devices on a local network to share a single public IP address by using
different port numbers.
Answer: A default gateway is the device that routes traffic from a local network to
external networks, usually a router that connects a LAN to the internet.
70. What is the difference between a static IP address and a dynamic IP address?
73. What is the difference between a unicast, multicast, and broadcast address?
Answer: A wireless access point (WAP) is a device that allows wireless devices to
connect to a wired network using Wi-Fi.
Answer: A firewall rule is a policy defined in a firewall that specifies which traffic is
allowed or denied based on criteria such as IP address, port number, or protocol.
Answer: A stateful firewall monitors the state of active connections and makes
decisions based on the context of the traffic, allowing or blocking packets based on
the connection state.
Answer: A stateless firewall filters packets solely based on predefined rules, without
considering the state of the connection or previous packets.
80. What is a DMZ in networking?
Answer: A DMZ (Demilitarized Zone) is a network segment that acts as a buffer zone
between an internal network and an external network, often used to host
public-facing services while protecting the internal network.
Answer: NAT traversal is a technique used to establish and maintain internet protocol
connections that must pass through NAT routers.
Answer: Split tunneling is a VPN configuration where only some traffic is sent through
the VPN tunnel while other traffic is routed directly to the internet.
Answer: A captive portal is a web page that a user must view and interact with before
being granted access to a public network, often used in Wi-Fi networks at airports or
cafes.
Answer: A network bridge connects two separate network segments, allowing them
to function as a single network, reducing collision domains and improving
performance.
Answer: Network sniffing is the process of monitoring and capturing data packets as
they travel across a network, often used for diagnostic or malicious purposes.
Answer: An IDS (Intrusion Detection System) monitors network traffic for suspicious
activity and alerts administrators to potential security breaches.
Answer: An IPS (Intrusion Prevention System) not only detects suspicious activity but
also takes action to prevent the threat from causing harm to the network.
Answer: In a star topology, all devices are connected to a central hub or switch,
which acts as a conduit for data transmission.
Answer: In a bus topology, all devices share a single communication line (bus), and
data is transmitted in both directions along the bus.
Answer: A content filter restricts access to certain types of content based on criteria
such as keywords, websites, or file types, often used to enforce security policies or
protect users.